blog-contributions/servers/opsec4levels/index.html
2024-07-25 12:23:36 +02:00

214 lines
11 KiB
HTML

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="">
<meta name="author" content="">
<link rel="shortcut icon" href="../../../../../../assets/img/favicon.png">
<title>Audit your OPSEC and determine the appropriate internet use</title>
<!-- Bootstrap core CSS -->
<link href="../../assets/css/bootstrap.css" rel="stylesheet">
<link href="../../assets/css/xt256.css" rel="stylesheet">
<!-- Custom styles for this template -->
<link href="../../assets/css/main.css" rel="stylesheet">
<!-- HTML5 shim and Respond.js IE8 support of HTML5 elements and media queries -->
<!--[if lt IE 9]>
<script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script>
<script src="https://oss.maxcdn.com/libs/respond.js/1.3.0/respond.min.js"></script>
<![endif]-->
</head>
<body>
<!-- Static navbar -->
<div class="navbar navbar-inverse-anon navbar-static-top">
<div class="container">
<div class="navbar-header">
<button type="button" class="navbar-toggle" data-toggle="collapse" data-target=".navbar-collapse">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="navbar-brand-anon" href="\index.html">nihilist`s Blog</a>
</div>
<div class="navbar-collapse collapse">
<ul class="nav navbar-nav navbar-right">
<li><a href="/about.html">About</a></li>
<li><a href="/blog.html">Categories</a></li>
<li><a href="https://blog.nihilism.network/donate.html">Donate</a></li>
<li><a href="/contact.html">Contact</a></li>
</ul>
</div><!--/.nav-collapse -->
</div>
</div>
<!-- +++++ Posts Lists +++++ -->
<!-- +++++ First Post +++++ -->
<div id="anon2">
<div class="container">
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<a href="../anon.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>nihilist@mainpc - 2024-06-08</ba></p>
<h1>Audit your OPSEC and determine the appropriate internet use</h1>
<p>In this tutorial we're going to explore how you can audit your own level of Operational Security (also known as opsec), using the following 6 parameters:<b>Complexity, Transparency, Surveillance, Centralisation, Onymity, and Deniability</b>. The goal is to determine the level of Privacy, Anonymity and Deniability of your operations online to determine what you can do safely.</p>
<img src="0.1.png" class="imgRz">
<p> Based on those, we are able to determine <b>the most appropriate Internet use.</b></p>
<img src="0.png" class="imgRz">
<p>Auditing your own OPSEC is an essential skill that you must possess, we're going to audit the 4 different setups below, to be able to determine where they fit. </p>
<p>To do so, we are going to simplify it down to 4 OPSEC levels: <b>Public, Private, Anonymous and Sensitive</b>.</p>
<img src="0.4.png" class="imgRz">
<p><u>Sidenote:</u> If your setup is suitable only for public internet use, you CANNOT use it for any private use, and so on. </p>
</div>
</div><!-- /row -->
</div> <!-- /container -->
</div><!-- /grey -->
<!-- +++++ Second Post +++++ -->
<div id="anon3">
<div class="container">
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>Bob's Setup: Public Internet Use </b></h2>
<img src="1.png" class="imgRz">
<p><img src="../co0.png"><u><b>Complexity:</b></u> Bob didn't put any effort. He bought his PC and windows was pre-installed, and he used it as it was.</p>
<p><img src="../tr2.png"><u>Transparency:</u> Bob uses windows as a host OS, and google chrome as his web browser. Both are closed-source, he does not know what his software is doing.</p>
<p><img src="../su2.png"><u>Surveillance:</u> Since bob uses closed-source software, he is under constant surveillance while using his computer.</p>
<p><img src="../ce2.png"><u>Centralisation:</u> Bob uses popular services that are centralised in nature, he depends on the goodwill of others to use their services</p>
<p><img src="../on2.png"><u>Onymity:</u> Because there is no privacy, anonymity is impossible for Bob.</p>
<p><img src="../de2.png"><u>Deniability:</u> Bob cannot deny anything that he's doing on his computer, as he is under constant surveillance, without any possibility of anonymity.</p>
<p><u>Conclusion:</u> <b>Bob's setup is suitable only for Public internet use</b>, as he is under constant surveillance while using it.</p>
</div>
</div><!-- /row -->
</div> <!-- /container -->
</div><!-- /white -->
<div id="anon2">
<div class="container">
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>Alice's Setup: Private Internet Use</b></h2> </br> </br>
<img src="2.png" class="imgRz">
<p><img src="../co1.png"><u>Complexity:</u> Alice has put some effort to get her current setup, she is willing to go out of her comfort zone to improve her OPSEC.</p>
<p><img src="../tr0.png"><u>Transparency:</u> Alice only uses open source software (Linux and Firefox) she can see from the sourcecode that it only does what it should do.</p>
<p><img src="../su0.png"><u><b>Surveillance:</b></u> Alice has verified that the open source software that she was using wasn't spying on her</p>
<p><img src="../ce1.png"><u>Centralisation:</u>Alice is starting to move away from centralised services, she's looking at other alternatives, but they are still centralised. </p>
<p><img src="../on1.png"><u>Onymity:</u> Alice is exploring anonymity, but through a pseudonym online, she is not anonymous yet.</p>
<p><img src="../de2.png"><u>Deniability:</u> Alice cannot deny that she has used her current setup </p>
<p><u>Conclusion:</u> <b>Alice's setup is suitable for Private use</b>, as she managed to remove surveillance from her setup.</p>
</div>
</div><!-- /row -->
</div> <!-- /container -->
</div><!-- /white -->
<!-- +++++ Second Post +++++ -->
<div id="anon1">
<div class="container">
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>Charlie's Setup: Anonymous Internet Use</b></h2> </br> </br>
<img src="3.png" class="imgRz">
<p><img src="../co2.png"><u>Complexity:</u> Charlie is willing to go at great lengths to improve his OPSEC</p>
<p><img src="../tr0.png"><u>Transparency:</u> Charlie only uses open source software, that way he knows that the software he uses only does what he wants it to do.</p>
<p><img src="../su0.png"><u>Surveillance:</u> Charlie has verified that the software he is using, is not surveilling what he's doing</p>
<p><img src="../ce0.png"><u>Centralisation:</u> Charlie has moved away from centralised services, and is using their decentralised counterpart from the fediverse </p>
<p><img src="../on0.png"><u><b>Onymity:</b></u> Charlie is anonymous online, thanks to it's use of the tor network through Whonix and tor browser</p>
<p><img src="../de1.png"><u>Deniability:</u> Charlie, thanks to his use of anonymity technologies, may be able to deny that he has used this setup depending on the context. However if an adversary gets physical access to his computer, he won't be able to deny that he has ever used it.</p>
<p><u>Conclusion:</u> <b>Charlie's setup is suitable for Anonymous use</b>, as he managed to implement anonymity technologies into his setup.</p>
</div>
</div><!-- /row -->
</div> <!-- /container -->
</div><!-- /white -->
<!-- +++++ Second Post +++++ -->
<div id="anon2">
<div class="container">
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>Dave's Setup: Sensitive Internet Use </b></h2> </br> </br>
<img src="4.png" class="imgRz">
<p><img src="../co2.png"><u>Complexity:</u> Dave is willing to go at great lengths to improve his OPSEC</p>
<p><img src="../tr0.png"><u>Transparency:</u> Dave only uses open source software, that way he knows that the software he uses only does what he wants it to do.</p>
<p><img src="../su0.png"><u>Surveillance:</u> Dave has verified that the software he is using, is not surveilling what he's doing</p>
<p><img src="../ce0.png"><u>Centralisation:</u> Dave has moved away from centralised services, and is using their decentralised counterpart from the fediverse </p>
<p><img src="../on0.png"><u>Onymity:</u> Dave is anonymous online, thanks to it's use of the tor network through Whonix and tor browser</p>
<p><img src="../de0.png"><u><b>Deniability:</b></u> Dave can deny that he has commited any anonymous activity, because the VM he uses is inside a veracrypt hidden volume, that he can deny the existance of. </p>
<p><u>Conclusion:</u> <b>Dave's setup is suitable for Sensitive use</b>, as he managed to implement plausible deniability on top of anonymity technologies into his setup.</p>
</div>
</div><!-- /row -->
</div> <!-- /container -->
</div><!-- /white -->
<div id="anon1">
<div class="container">
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>Recap of the 4 basic OPSEC levels</b></h2> </br> </br>
<img src="0.3.png" class="imgRz">
<p>Now as you can see, the higher the opsec level, the more complexity one must be willing to bear with, in order to increase their own operational security.</p>
<p>Take the 6 parameters into account before trying to use a specific setup for an inappropriate internet usage. If you want to have all of those 4 setups at once, check out my tutorial on <a href="../internetsegmentation/index.html">VM-based internet usage segmentation</a></p>
</div>
</div><!-- /row -->
</div> <!-- /container -->
</div><!-- /white -->
<!-- +++++ Footer Section +++++ -->
<div id="anonb">
<div class="container">
<div class="row">
<div class="col-lg-4">
<h4>Nihilism</h4>
<p>
Until there is Nothing left.
</p>
</div><!-- /col-lg-4 -->
<div class="col-lg-4">
<h4>My Links</h4>
<p>
<a target="_blank" rel="noopener noreferrer" href="http://blog.nihilism.network/rss/feed.xml">RSS Feed</a><br/><a target="_blank" rel="noopener noreferrer" href="https://matrix.to/#/#nihilism:m.datura.network">Matrix Chat</a><br/>
</p>
</div><!-- /col-lg-4 -->
<div class="col-lg-4">
<h4>About nihilist</h4>
<p style="word-wrap: break-word;"><u>Donate XMR:</u> 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8</p></br><p><u>Contact:</u> nihilist@nihilism.network (<a href="https://nihilism.network/nihilist.pubkey">PGP</a>)</p>
</div><!-- /col-lg-4 -->
</div>
</div>
</div>
<!-- Bootstrap core JavaScript
================================================== -->
<!-- Placed at the end of the document so the pages load faster -->
</body>
</html>